Showing posts with label most. Show all posts
Showing posts with label most. Show all posts

May 11, 2022

Top 20 C# Language Interview Questions and Answers

  

        Microsoft's C# is an object-oriented programming language. The.NET framework uses C# to create websites, applications, and games. C# is popular for a variety of reasons. C# is described as being easier to learn than other programming languages. You're more likely to construct online applications or gaming apps with C#. Automatic garbage collection, interfaces, and other features in C# enable developers create better apps.

Collaboration with Microsoft gives C# applications an advantage since they can reach a broader audience. Because C# is such a popular programming language, many large and small businesses utilise it to build their products. So, to ace the interviews, prepare yourself with basic and advanced level C# questions.


BlockChain interview Questions and Answers


Ques. 1): Is it possible to run several catch blocks?

Answer:

No, you cannot execute multiple catch blocks of the same type. Control is handed to the finally block after the correct catch code has been completed, and then the code that follows the finally block is executed.


C language Interview Questions and Answers


Ques. 2): What exactly are the distinctions between public, static, and void?

Answer:

Anywhere in the application, public stated variables or methods are accessible. Without generating an instance of the class, static declared variables or methods are globally available. The type of access modification used determines whether or not static members are globally available by default. The method's address is saved as the entry point, and the compiler utilises this information to start execution before any objects are generated. And Void is a type modifier that indicates that the method or variable returns nothing.


C++ language Interview Questions and Answers


Ques. 3): In C#, what is garbage collection?

Answer:

Garbage collection is the process of releasing memory held by undesirable things. When you create a class object, some heap memory space is automatically allocated to the object. After you've completed all of the activities on the item, the memory space it takes up becomes wasted. Memory must be made available. Garbage collection occurs in three situations:

  • If the occupied memory by the objects exceeds the pre-set threshold value.
  • If the garbage collection method is called
  • If your system has low physical memory


Machine Learning Interview Questions and Answers


Ques. 4): Define Constructors in  C#.

Answer:

A function Object() { [native code] } is a member function that has the same name as the class it belongs to. When an object class is created, the function Object() { [native code] } is called automatically. While initialising the class, it constructs the values of data members.


MySQL Interview Questions and Answers


Ques. 5): What exactly are Jagged Arrays?

Answer:

The array with array elements is known as a jagged array. The elements can be of various shapes and sizes. An Array of arrays is another name for jagged Array.


PHP Interview Questions and Answers


Ques. 6): What is the difference between Custom Control and User Control?

Answer:

Custom Controls are compiled code (Dll) controls that are easier to use and may be added to the toolbox. Developers can add controls to their web forms by dragging and dropping them. At design time, attributes can be used. Custom controls can be simply added to multiple applications (If Shared Dlls). If they are private, we can copy the dll to the web application's bin directory, add a reference, and use them.

User Controls are comparable to ASP include files in that they are simple to construct. It is not possible to drag and drop user controls into the toolbox. They have their own code and design. Ascx is the file extension for user controls.


PowerShell Interview Questions and Answers


Ques. 7): What’s the difference between the Array.CopyTo() and Array.Clone()?

Answer:

The Clone() method copies an array shallowly. A shallow copy of an Array duplicates only the elements of the Array, regardless of whether they are reference or value types, but not the objects to which the references link. The references in the new Array point to the same objects as the previous Array's references.

The Array class's CopyTo() static function copies a piece of one array to another array. The CopyTo method transfers all of an array's items to a new one-dimensional array. Listing 9 shows how to copy the contents of an integer array to an array of object types.


Python Interview Questions and Answers


Ques. 8): In C#, what are the different types  of classes?

Answer:

A class is a logical unit that contains all of the properties of its objects and instances. There are four sorts of such classes in C#:

Static type: The keyword'static' defines a class that does not allow inheritance. As a result, you won't be able to construct an object for a static class.

static class classname 

{ 

  //static data members 

  //static methods 

}

Partial class: Partially divided or shared source (.cs) files are possible with the partial class, which is defined by the term 'partial.'

Abstract class: Abstract classes are classes that cannot be instantiated and cannot be used to construct objects. Abstract classes are based on the OOPS abstraction idea. Abstraction aids in separating important details from those that aren't.

Sealed class: A sealed class is one that can't be inherited. To prevent users from inheriting that class, use the keyword sealed.


Python Pandas Interview Questions and Answers


Ques. 9): What is IEnumerable<> in C#?

Answer:

 IEnumerable is the parent interface for all non-generic collections in System.Collections namespace like ArrayList, HastTable etc. that can be enumerated. For the generic version of this interface as IEnumerable<T> which a parent interface of all generic collections class in System.Collections.Generic namespace like List<> and more.

 In System.Collections.Generic.IEnumerable<T> have only a single method which is GetEnumerator() that returns an IEnumerator. IEnumerator provides the power to iterate through the collection by exposing a Current property and Move Next and Reset methods if we don’t have this interface as a parent so we can’t use iteration by foreach loop or can’t use that class object in our LINQ query.


SQL Server Interview Questions and Answers


Ques. 10): In C#, what are extension methods? How may extension techniques be used?

Answer:

Extension methods allow you to add methods to existing types without having to create a new derived type, recompile it, or modify it in any way.

An extension method is a form of static method that is referred to as if it were an instance method on the extended type.

A static method of a static class with the "this" modifier appended to the first parameter is called an extension method. The extended type will be the type of the first parameter.

Extension methods are only in scope if you use a using directive to explicitly import the namespace into your source code.


Unix interview Questions and Answers


Ques. 11): What makes the System.String and System.Text.StringBuilder classes different?

Answer:

System.Strings are unchangeable. When we change the value of a string variable, the existing memory allocation is released and fresh memory is allocated to the new value. System. StringBuilder was created with the idea of a mutable string that can be used for a number of operations without requiring a separate memory address for the updated string.


Ques. 12): What are Generics in C#?

Answer:

In C# collections, defining any kind of object is termed okay which compromises C#’s basic rule of type-safety. Therefore, generics were included to type-safe the code by allowing re-use of the data processing algorithms. Generics in C# mean not linked to any specific data type. Generics reduce the load of using boxing, unboxing, and typecasting objects. Generics are always defined inside angular brackets <>. To create a generic class, this syntax is used:

GenericList<float> list1 = new GenericList<float>();

GenericList<Features> list2 = new GenericList<Features>();

GenericList<Struct> list3 = new GenericList<Struct>();

Here, GenericList<float> is a generic class. In each of these instances of GenericList<T>, every occurrence of T in the class is substituted at run time with the type argument. By substituting the T, we have created three different type-safe using the same class.

 

Ques. 13): In C#, how do you tell the difference between boxing and unboxing?

Answer:

Both boxing and unboxing are used to convert types, however they have some differences:

Boxing: Boxing is the conversion of a value type data type to an object or any interface data type that this value type implements. When the CLR converts a value type to an Object Type, it wraps the value in a System.Object and stores it in the application domain's heap region.

 

Unboxing: Unboxing is a technique for determining the value type of an object or any implemented interface type. Unboxing, on the other hand, must be done explicitly via code.

 The concept of boxing and unboxing underlies the C# unified view of the type system in which a value of any type can be treated as an object.

 

Ques. 14): What is the difference between a struct and a class in C#?

Answer:

Class and struct are both user-defined data types, but have some major differences:

Struct

  • The struct is a value type in C# and it inherits from System.Value Type.
  • Struct is usually used for smaller amounts of data.
  • Struct can’t be inherited from other types.
  • A structure can't be abstract.
  • No need to create an object with a new keyword.
  • Do not have permission to create any default constructor.

Class

  • The class is a reference type in C# and it inherits from the System.Object Type.
  • Classes are usually used for large amounts of data.
  • Classes can be inherited from other classes.
  • A class can be an abstract type.
  • We can create a default constructor.

 

Ques. 15): What is the difference between the dispose and finalize methods in C#?

Answer:

Both finalise and dispose are strategies for releasing unmanaged resources.

 Finalize: 

  • Finalize is used to liberate unmanaged resources in the application domain that are no longer in use, such as files and database connections.
  • These are the resources that an object has before it is destroyed. Garbage Collector calls it in the internal process, and no user code or service can call it manual.
  • Finalize belongs to System.Object class.
  • When your code contains unmanaged resources, use it to ensure that these resources are removed when garbage collection occurs.

Dispose: 

  • Dispose can also be used to liberate unmanaged resources in the Application domain, such as files and database connections, at any time.
  • Manual user code directly calls dispose.
  • We must implement the disposal method via the IDisposable interface if we want to use it.
  • It's a part of the IDisposable interface.
  • When building a custom class that will be used by other users, remember to include this.

 

Ques. 16): In C#, what is the difference between late and early binding?

Answer:

One of the key concepts of OOPS is polymorphism, which includes late binding and early binding.

For example, one function calculateBill() will calculate premium, basic, and semi-premium clients' bills differently depending on their plans. The calculations for all of the customer objects are done differently using the same polymorphism function.

The.NET framework conducts the binding when an object is allocated to an object variable in C#.

Early binding occurs when the binding function is performed at build time. It investigates and tests the static objects' methods and properties. The amount of run-time mistakes is significantly reduced with early binding, and it executes swiftly.

Late binding, on the other hand, occurs when the binding occurs at runtime. Late binding occurs when run-time objects are dynamic (determined by the data they contain). It's slower because it's looking through during the process.

 

Ques. 17): Is it possible to utilise "this" inside a static method?

Answer:

Because the keyword 'this' returns a reference to the current instance of the class containing it, we can't use it in a static method. Static methods (or any other static element) are not associated with a specific instance. We can't use this keyword in the body of static Methods since they exist without creating an instance of the class and are called with the name of the class, not by instance. In the case of Extension Methods, however, we can use the function's parameters.

Let's take a look at the keyword "this."

The "this" keyword in C# is a particular form of reference variable that is implicitly defined as the first parameter of the type class in which it is specified within each function Object() { [native code] } and non-static function.

 

Ques. 18): What are delegates in C# and how do you utilise them?

Answer:

A Delegate is an abstraction of one or more function pointers (as in C++; a detailed explanation is beyond the scope of this article). The concept of function pointers has been implemented in the form of delegates in.NET. You can use delegates to treat a function like data. Functions can be supplied as parameters, returned as a value, and saved in an array using delegates. The following are qualities of delegates:

  • Delegates are derived from the System.MulticastDelegate class.
  • They have a signature and a return type. A function that is added to delegates must be compatible with this signature.
  • Delegates can point to either static or instance methods.
  • Once a delegate object has been created, it may dynamically invoke the methods it points to at runtime.
  • Delegates can call methods synchronously and asynchronously.

There are a few useful fields in the delegate. The first has an object reference, whereas the second contains a method pointer. The instance method on the contained reference is called when you call the delegate. If the object reference is nil, however, the runtime interprets this to suggest that the method is static. Furthermore, calling a delegate is syntactically identical to calling a regular function. Delegates are thus ideal for implementing callbacks.

 

Ques. 19): In C#, describe accessibility modifiers. Why should you use access modifiers?

Answer:

Access modifiers are keywords that specify a member's or type's declared accessibility.

Access modifiers are keywords that describe the accessibility of a type member or the type itself. A public class, for example, is open to the entire world, whereas an internal class is only open to the assembly.

Object-oriented programming relies heavily on access modifiers. To implement OOP encapsulation, access modifiers are utilised. You can use access modifiers to control who has and doesn't have access to particular functionalities.

In C# there are 6 different types of Access Modifiers:

public:    There are no restrictions on accessing public members.

Private:    Access is limited to within the class definition. This is the default access modifier type if none is formally specified

protected:    Access is limited to within the class definition and any class that inherits from the class

internal:    Access is limited exclusively to classes defined within the current project assembly

protected internal:    Access is limited to the current assembly and types derived from the containing class. All members in the current project and all members in derived class can access the variables.

private protected:    Access is limited to the containing class or types derived from the containing class within the current assembly.

 

Ques. 20): In C#, how do you use the using statement?

Answer:

The using keyword in C# can be used in two ways. One is in the form of a mandate, while the other is in the form of a statement. Let me clarify!

using Directive:

In code-behind and class files, we usually utilise the using keyword to add namespaces. Then it makes all the classes, interfaces, and abstract classes on the current page, as well as their methods and properties, available.

Using Statement :

Another approach to utilise the using keyword in C# is as follows. It is critical to enhance garbage collection performance.



December 23, 2019

Top 20 BlockChain interview Questions & Answers


Ques: 1. What are the differences between a traditional database and Blockchain database?

Ans: The difference between a traditional database and blockchain database is as follows:

1. Storage of Records: In a traditional system the records are centralized whereas in Blockchain the records are decentralized.

2. Operations Done: In a Blockchain system, you can only perform insert operations whereas in the traditional system you can read, edit, create and update the transactions.

3. Validations of transactions: You can validate any number of transactions on the network in a Blockchain whereas in the traditional database only specific nodes are allowed to validate the transactions.


Ques: 2. What are Ethereum Smart Contracts and in which language is Ethereum written?

Ans: A Smart Contract is a set of program that gets automatically executed on meeting the certain requirements of Blockchain. Ethereum is generally written in Solidity programming language.


Ques: 3. What are the types of record that can be kept in Blockchain?

Ans: In Blockchain, you can keep any number of records. Few of the records that can be kept in the blockchain ledger are:

1. Medical Transactions and history

2. The identity of numerous persons

3. Several numbers of events that take place in an organization and organizational records

4. Management records of companies that can be accessed from anywhere in the world with proper secure transactions

5. Documents that are to be kept at high-level security


Ques: 4. What are the benefits of Blockchain in business?

Ans: European Banks have already launched their projects to use this technology. The international payments system VISA has also joined them. Blockchain gives several advantages to the financial sector some of which are listed below:
  • Money Transfer will become faster and cheaper payments are possible and significantly reduce their costs. 
  • With the help of the Smart Contracts are computer programs which facilitate to verify and negotiation of the agreement. 
  • In stock exchange Blockchain can remove brokers as intermediaries and decentralize the stock exchange system.

Ques: 5. What are the basic components of the Blockchain Ecosystem?

Ans: There are four basic components of Blockchain ecosystem as explained here:
  • Shared Ledger:  It is a distributed data structure shared among peers managed inside Node application. 
  • Node Application: Each of the nodes is installed and run on a computer to become a part of the blockchain network. 
  • Virtual Machine: Here the implementation of instruction takes place and every participant runs that VM. 
  • Consensus Algorithm: It is implemented as a part of node application which provides the rules for validation of transactions.

Ques: 6. How many cryptographic algorithms are used in Blockchain?

Ans: Here are some of the widely used cryptographic algorithms:
  • Triple DES: DES stands for digital encryption system which uses 3 different keys of 56 bits. 
  • RSA: It is used in several areas in the digital certificate which is a public key encryption algorithm to encrypt the information transferred on the internet. 
  • Blowfish: It is highly effective and works with great speed which encrypts the cipher messages individually. 
  • Twofish: It is similar to blowfish with keys of length 256 bits. 
  • AES: Of all algorithms, AES is the strongest encryption algorithm to breach out as it uses 192 and 256 length bit keys for heavy encryption.

Ques: 7. Can you explain pragma and provide its syntax?

Ans: Pragma is a version of Solidity that will be used by the code that is written in the solidity. For using solidity as a compiler and writing smart contracts the version should be higher than 0.4.0. Every Smart contract starts with pragma only.

Syntax: version pragma ^0.4.00.


Ques: 8. What do you mean by Merkle trees and explain its importance in Blockchain?

Ans: Also called as the hash tree, Merkle tree is the fundamental part of a Blockchain. merkle tree uses cryptographic blocks which are used to securely transact large chunks of data. Both Ethereum and Bitcoin use Merkle trees.


Ques: 9. What do you understand by 51% attack?

Ans: The blockchain is a chain of blocks that stores all transactional data in a period. Once the block enters the system it cannot be altered, and the fraudulent data would be automatically rejected by network users. However, if 51% of the miners are controlled then a group of attackers can interfere with the process of recording of new blocks. 
They can block other users transactions and reverse it also. It is also known as double spending. A network that would allow double spending could suffer a loss of confidence. Then this kind of attack is called a 51% attack.


Ques: 10. What is a block in blockchain technology?

Ans: Blocks are the storage unit of the blockchain. They are fundamental to the network, and the transactions data is stored within them. They be books with each page equivalent to a transaction. Blocks are immutable. This means if a data is recorded, it cannot be changed or deleted. Also, blocks are organized linearly in a blockchain.
A block is mined by a miner which acts to verify the transaction. This means that until a transaction is not mined, it will not be shown on the blockchain and the transaction will be deemed incomplete.


Ques: 11. What is the role of encryption in blockchain?

Ans: Encryption is an age-old technique to protect data from third parties or leak. It is the basics of data security in the modern world. Blockchain also utilizes encryption to good effect. The data before it is sent off to the receiver is encrypted. The received will only be able to unlock it as it is only meant for him. Once the receiver receives it, it is unencrypted and can be used as liked.
Blockchain also uses encryption in other ways. Also, modern blockchain solution tends to improve encryption and provide complete privacy-based experience for users.


Ques: 12. What is the difference between the standard ledger and a blockchain ledger?

Ans: The biggest difference between these two types of ledger is the decentralization that they have to offer. Blockchain ledger is decentralized which means that it offers unique capabilities such as trust, immutability, transparency, and security. Standard ledger does carry these features but is limited to certain extent.
As humans create, modify and monitor the standard ledger, there is always a chance of an error creeping in or worse a security breach. Blockchain ledger solves all the problems that standard ledger has by providing a decentralized version.


Ques: 13. What is Node Application? Explain in detail.

Ans: Node application is a computer application that a computer needs to be part of the ecosystem. Without the node application, it is not possible for a device to participate in blockchain activity.
There is different node application when it comes to the blockchain. Bitcoin, for example, uses the Bitcoin wallet application to make a computer compatible with the blockchain.
Technically, there is a service overlay network(SON) that interfaces between the blockchain and the computer. The computer needs to use the node application to read and reply in a specific manner,
Not all node application is free from restriction. Some blockchains are stick when allowing a node to join the application. It needs permission to do so.


Ques: 14. What are the different types of Consensus Algorithm? Explain each of them briefly.

Ans: There are three main types of consensus algorithm.
  1. Proof-of-Work(PoW): Proof-of-Work(PoW) is used by the most popular cryptocurrencies out there. Bitcoin, Ethereum, and Litecoin use it. It works by solving complex mathematical problems. The hash needs to be solved for the block to be mined. Once it is done, the transaction is validated, and the consensus is made.
  2. Proof-of-Stake(PoS): Proof-of-Stake(PoS) works by staking coins. The nodes need to stake a minimum amount of coins to become part of the consensus network. Once they become part, they actively take part in making decisions on the network. Unlike Proof-of-Work, PoS doesn’t require huge computational power, and hence power. 
  3. Delegated Proof-of-Stake(DPoS): Delegated Proof-of-Stake is a centralized approach to a blockchain network. In this consensus method, the stakes choose delegates which in turn validate the transactions.

Ques: 15. What is ‘blind signature’ and why is it used?

Ans: Blind Signature is a digital signature wherein all the information pertaining to a contract is made blind before it is actually agreed upon and sealed with a sign. This approach is a crucial component of cryptography and is mainly used for privacy-related protocols (for example, digital cash scheme) where the author and the signing parties are different.


Ques: 16. What are the fundamental principles in Blockchain that are used to eliminate security threats?
Ans: The fundamental principles in Blockchain that must be followed to eliminate security threats are:
  1. Auditing 
  2. Securing applications 
  3. Securing testing and similar approaches 
  4. Database security 
  5. Continuity planning 
  6. Digital workforce training

Ques: 17. What do you understand by the terms – ‘public key’ and ‘private key.’?

Ans: A public key is one which is used in cryptographic algorithms that allow all the users/peers in a Blockchain network to receive funds in their wallet. This key is essentially an alphanumeric string that is unique to a particular node or address.
A private key, on the other hand, is an alphanumeric phrase that is used in pair with a public key for encryption and decryption purposes. This key remains with a single individual who is the key generator for it. In case, anyone else gets their hand on the private key, the data within the wallet of the generator will be compromised.


Ques: 18. What do you mean by ‘off-chain’ transactions?

Ans: An off-chain transaction occurs when values are moved or placed outside the Blockchain. In this sense, it is merely a ‘transaction’ and not a ‘Blockchain transaction.’ Such transactions have no bearings on the values stored within the blocks of a Blockchain. 


Ques: 19. Explain ‘secret sharing.’

Ans: Secret Sharing is a method dedicated to protecting data integrity in Blockchain. In this method, the information or data is divided into different units and then transferred to the users on the Blockchain network. To complete the entire information, users who received the chunks of broken information must agree to share their pieces of information and combine them together.


Ques: 20. Explain a real-time blockchain use case?

Ans: Healthcare can use blockchain to their advantage. Many startups are currently working on a blockchain powered health app that lets patients store their information on the blockchain. The decentralized nature means that they don’t have to carry documents. Healthcare specialist can also take advantage of it as they can access the patient’s data anytime they want. Researchers also benefit from public blockchain where they can access large public data.


December 08, 2019

Top 20 Oracle Fusion Applications interview Questions and Answers


Ques: 1. Why do Oracle Fusion Applications so different?

Answer: 

The biggest difference about oracle fusion applications is the usability. While most applications are developed to fulfil functionality, Oracle Fusion Applications were developed with a huge emphasis on usability. Oracle invested much effort in understanding usability needs by conducting multitudes of usability testing sessions. Leveraging this user feedback and best practices from existing applications, the Usability team established guidelines, design patterns and standards that were easily implemented by Oracle Product Development.

Oracle Fusion Applications provide a consistent, role-based user interface that is infused with Web 2.0 capabilities and incorporates embedded decision support. As I’ve started to use Oracle Fusion Applications, I now realize how significantly simpler it is to do your work with intuitive and intelligent user experience.

 

Oracle Fusion Applications interview Questions and Answers

 

Ques: 2. What is the foundation for Fusion Applications?

Answer: 

Oracle Fusion Middleware provides support for security, user interface framework, business intelligence, collaboration, search capabilities, business process orchestration and extensibility of Oracle Fusion Applications.

Oracle Fusion Applications are built on the industry-leading, open-standards Oracle Fusion Middleware platform, which includes some of the most powerful, state-of-the-art technology available.


Oracle Financials Interview questions and Answers

 

Ques: 3. What is File Based Data Import (FBDI) and ADFDI in Fusion?

Answer: 

FBDI is one of the tool available in the Oracle Fusion to import the data from External application. This is the Excel Based Prebuilt Data Templates in which we put the Data to migrate in the Oracle Cloud. This upload the Data in the Form of CSV Files.

ADFDI is another Data Import tool in oracle fusion to insert the data in the Oracle Cloud. ADFDI is the same as WebADI in Oracle Apps which is totally integrated with the application. This works online as compared to the FBDI which works offline means we prepare the data offline so ADFDI provided the real time data validation.

 

Oracle SCM Interview Questions and Answers

 

Ques: 4. What are the Reporting tools available in the Oracle Fusion?

Answer: 

  • BIP Reports 
  • OTBI reports 
  • Smart View Reports 
  • Financial Reporting Studio


Oracle Fusion HCM Interview Questions and Answers

 

Ques: 5. What is OTBI Report?

Answer: 

OTBI is the report tool available in the Oracle Fusion, which is used to create the reports in oracle cloud. OTBI is the very user-friendly tool available in oracle fusion, where we can develop the reports with just drag and drop options. It does not require the SLQ expertise and the Fusion tables knowledge to build the reports. This is the very interesting tool available in Oracle Fusion to extract the data from the system.

 

Oracle ADF Interview Questions and Answers

 

Ques: 6. What is Financial Reporting Studio in Oracle Fusion?

Answer: 

Financial Reporting Studio is a client based Financial Reporting tool which is uses to build the Financial reports in Oracle Fusion. This is more like FSG reports in Oracle Apps. This FR studio works on the GL balances. This Uses drag and drop functionality to create a grid to design the rows, columns and pages of the financial report. This Contains grids and other objects that are reusable across multiple reports. FR Studio Uses the GL Balances Cube dimensions on either rows, columns, pages and Point of Views (POV).

 

Oracle Accounts Payables Interview Questions and Answers

 

Ques: 7. What is Sandbox in Oracle Fusion?

Answer: 

In EBS Sandbox related to Server but in Oracle fusion Sandbox is totally different concept. In Oracle Fusion , We will Use Sandbox to do any kind of Personalizations or Extensions or Page layout changes in Oracle Fusion Web-pages. It means we need to create Sandbox first to make any changes in Oracle Fusion application in terms of Personalizations or Extensions. 

Then all the changes will be done under this sandbox and this is the important feature of the sandbox that , we can do the changes in the application without impacting the complete application so these changes will only apply under the sandbox and other users of the application will not see these changes until unless you have tested the changes under sandbox and publish this sandbox. Once you will publish the sandbox in fusion then all the changes under the sandbox will be published to all the users in the application.

 

Oracle Access Manager Interview Questions and Answers

 

Ques: 8. How many Types of Roles Available in Oracle Fusion?

Answer: 

Oracle has provided these four Types of roles. 

  • Abstract role
  • Job roles 
  • Duty roles 
  • Data roles

 

Oracle PL/SQL Interview Questions and Answers

 

Ques: 9. What Is ESS job in Oracle Fusion?

Answer: 

ESS job is same like concurrent Program in Oracle apps. If we need to run the BIP reports in the Fusion Application then we need to register these reports as a ESS jobs in Oracle Fusion. Then after that we can run this report in the Fusion as a Schedule process same as as    concurrent request in the Oracle apps.

 

Oracle SQL Interview Questions and Answers

 

Ques: 10. What is BPM Worklist in Oracle Fusion?

Answer: 

BPM worklist is list of BPM workflows available in Oracle fusion which we can design as per our business Requirment in oracle fusion. We cannot create the new worklist in BPM, We can only use the existing Workflows in the BPM Worklist. In the BPM worklist, We have the approval for Expenses , AP invoice , GL Journals, PO and Requisition AR Invoices and the Cash Advance approvals and many others.


Oracle Cloud Interview Questions and Answers


Ques: 11. What is Job Set in Oracle Fusion?

Answer: 

Job set is same like Request set in Oracle apps. Like in Oracle apps , We combine multiple concurrent Programs in a Request set in the same way , We Combine Multiple ESS jobs in a Fusion Job set. Job set is the set of Multiple ESS Jobs. When We want to run the same set of ESS jobs Together in Oracle Cloud, then we can add these ESS jobs in the job set and then We only need to run this concurrent Job set and all the ESS jobs under this Job set can be run together in sequentially or Parallelly order.


Oracle RDMS Interview Questions and Answers

 

Ques: 12. What is My Folder and Shared Folder in Fusion Reports?

Answer: 

My Folders: 'My Folders' is your own folder. It means it is specific to each user. when you will create your report under this folder then no one in the application can see and access these reports because these are saved and created under your My folder. so this is totally yours personal Development.

Shared Folders: Shared Folders is your Application Common Folder. It means it is shared across users of the application as per the roles. Shared folders have many Sub-folders related to the Work related and Module Related. 

Oracle has already given standard OTBI reports, Data Models and Dashboards under the sub-folders in the Shared Folders. When you will create any report under the sub-folder of Shared Folders then your report will be visible and accessible to other users of the application as per the Permission and role of that user.


BI Publisher Interview Questions and Answers

 

Ques: 13. How to get the Oracle Fusion application information’s in the BIP reports?

Answer: 

In Oracle Apps R12 reports , we can easily get the user information through Profile option like USER_ID, RESP_ID but in Oracle Fusion to get the user information. you need to user : and then System variable name in your SQL query.

Select  :xdo_user_name, :xdo_user_roles From Dual;


Oracle 10g Interview Questions and Answers

 

Ques: 14. What Is File De Batching?

Answer: 

When a file contains multiple messages, you can choose to publish messages in a specific number of batches. This is referred to as de-batching. During de-batching, the file reader, on restart, proceeds from where it left off in the previous run, thereby avoiding duplicate messages. File de-batching is supported for files in XML and native formats.

 

Ques: 15. What Is Schematron Validation?

Answer: 

You can specify Schematron files for validating an inbound message and its various parts. Schematron version 1.5 is the supported version. Schematron is an XML schema language, and it can be used to validate XML.

 

Ques: 16. What Is the role of Oracle Mediator?

Answer: 

Oracle Mediator provides a lightweight framework to mediate between various components within a composite application. Oracle Mediator converts data to facilitate communication between different interfaces exposed by different components that are wired to build a SOA composite application.

 

Ques: 17. What Are Major Benefits For Psft Financials Users?

Answer: 

  • Cash basis accounting
  • Bill Presentment Architecture
  • Credit Management
  • Advanced Collections
  • credit card processor integrations.

 

Ques: 18. What are major footprints in Fusion Financial Management?

Answer: 

Fusion Financial Management component of the Oracle Fusion Applications suite, it revolutionizes productivity and information access with native, real-time intelligence. Current offering is with these foot prints.

  • General Ledger
  • Accounts Payable
  • Accounts Receivable
  • Asset Management
  • Payments and Collections
  • Cash and Expense Management.

 

Ques: 19. What Are The Other Replacement Feature In Fusion That Makes A Difference To Ebs User?

Answer: 

Yes there are couple of them , here are few:

  • Identity Manager in Fusion apps replaces FND User
  • Business Units is replaced Operating Units
  • Access Control Governor replaces OICM
  • Date Effectivity replaces DateTrack.

 

Ques: 20. Does Fusion Application Have Flex Field Feature?

Answer: 

Yes, similar to EBS, fusion application have flex feild concept. Fusion is supporting mainly three types of flexfields

  1. Descriptive flexfields
  2. Extensible flexfields
  3. Key flexfields

These flexfield enables enable implementers to configure application features without programming and fully supported within Oracle Fusion Applications.